Describe role of protocols in network communications

Assignment Help Computer Networking
Reference no: EM13742788

1. Network administrators and support personnel commonly use the _ utility to verify connectivity between two network end points.

A. Path

B. Transport

C. Ping

D. SYN

2. A _ spans multiple geographic areas and is usually connected by common telecommunication carriers.

A. WAN

B. LAN

C. MAN

D. SAN

3. Network administrators typically configure a router directly through the port known as the port located on the back of the router.

A. console

B. Aux

C. Serial

D. Fast Ethernet

4. A _ is an intermediary device that operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and moves packets based on the layer 3 addresses.

A. Personal Computer

B. Switch

C. Hub

D. Router

5. The OSI model layer defines transmission of light over a fiber optic cable.

A. Transport

B. Physical

C. Data Link

D. Network

6. Which term below is used to prioritize traffic in network systems?

A. Fault-tolerance

B. QoS

C. Security

D. Scalability

7. Which answer below describes a converged network?

A. One Local Area Network connected to another

B. One Wide Area Network connected to another

C. A network that is currently out of service

D. A network that can carry many different types of traffic

8. A (n) _ address identifies both a network and a host, so you can route communications through large networks, including the Internet.

A. Port

B. ARP

C. IP

D. MAC

9. A ___ is contained within one company or department and located in a single geographic area, usually a campus, building or part of a building.

A. SAN

B. MAN

C. WAN

D. LAN

10.   Which layer has both a header and trailer used in its encapsulation?

A. Presentation

B. Internet

C. Network Access

D. Physical

11.   Which one of the following pieces of equipment is not an end device in a network environment?

A. IP Phone

B. Router

C. Personal Computer

D. Server

12.   In _ communications, devices can send or receive signals, but not both at the same time.

A. half-duplex

B. full-duplex

C. duplex

D. wire-duplex

13.   Which of the following terms is another name for a physical numeric address?

A. IP address

B. MAC layer address

C. PROM address

D. Port address

14.   The PDU at the nehwork access layer is called a(n)

A. Segment

B. Datapack

C. Frame

D. Packet

15.   Which is the user prompt or enable prompt below:

A. Route r>

B. Routerff

C. Router(Config)ff

D. Router(£nable)>

16. How do you saw changes to the configuration file?

A. Copy run start

B. Copy start run

C. Copy flash start

D. Copy run nwam

17. In TCP/IP the Network Access includes the following OSt layers.

A. Network and Data Link

B. Network and Transport

C. Data Link and Physical

D. Session and Transport

18. After creating data with a software application, the first step of Data Encapsulation is?

A. Frame Headers and trailers added

B. Bit Transmission

C. Segmentation

D. Packet creation and network header

19. What command do you use to enter global configuration mode?

A. global conf

B. term global conf

C. con f global

D. configure terminal

20. Which of the following describes the OS[ Physical Layer?

A. Handles Link control and uses the MAC address on the NIC

B. Translates, encrypts or prepares data from the Application Layer for network transmission

C. Provides the electrical transmission of data

D. Establishes, maintains and manages sessions between applications

21.  For the OSI network model list all 7 layers of the QSI model in order from top to bottom.

22. Complete the table below for the 4 layers of the TCP/IP model. The 1st layer is done for you. 

TCP/IP Layer Name

PDU TYPE

AODRESStNG USED

 

Application

Data

None

 

 

 

 

 

 

 

 

 

23. Name 3 main components of any modern day network.

24. Describe the role of protocols In network communications.

Reference no: EM13742788

Questions Cloud

What technical/economi revolution started in england : what technical/economi revolution started in England and that has had long-lasting implications?
Write an essay on the nuclear testing to global terrorism : Write an essay on the Cold War America: From Nuclear Testing to Global Terrorism. The prosperity and freedoms of favored American citizens has always required that others be deprived.
Home country : Home Country: Given that the total market of the Home country is 900,000 units. Given the equations and parameter values above, solve for the equilibrium number of automobile companies, the number of cars each firm will produce, and the price of the ..
The intra-industry trade model : Explain the Krugman Imperfect Competition Model of intra-industry trade in automobiles, and what the model means. Use diagrams to demonstrate the model in autarky and in free trade, and to show the existence of gains from trade.
Describe role of protocols in network communications : Describe the role of protocols In network communications and what command do you use to enter global configuration mode and Name three main components of any modern day network.
Ease and simplicity of our current technological devices : What are some of the ways that the ease and simplicity of our current technological devices also lead us at times to surrogate our daily responsibilities onto these devices?
Describe the innovation life cycle proposed : Describe the innovation life cycle proposed by Abernathy and Utterback. Does the model provide a useful tool to guide and manage the innovation process? Do you see any weak points in the model?
Market demand for long-playing records : Over the years the market demand for “long-playing records made of polyvinyl has fallen considerably as new technologies replaced the old “lp” yet lps are still available for sale and they sell at price points higher (in some cases much higher) than ..
Representative consumer has well-behaved preferences : Consider the utility-maximizing model in a two-good world, where our representative consumer has well-behaved preferences that result in smooth indifference curves that are convex to the origin.

Reviews

Write a Review

Computer Networking Questions & Answers

  Computer security is not an issue for organizations alone

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Producing list of mac addresses and ip addresses

You have been asked in order to produce a list of the MAC addresses and the corresponding IP addresses and computer names within your network. Suggest at least two methods in order to complete this task.

  When should distance-vector routing be used and how do

question 1 when should distance-vector routing be used and how do distance-vector routing protocols work? can you

  Why would a company want a network on its premises

Why would a company want a network on its premises? How would a department or company benefit by having a network?

  Research the web and choose and describe 3 tools which can

research the web and select and discuss 3 tools that can be used to test network reliability. assignment guidelinesbull

  Create three types of design decisions-frame size

We need to create three types of design decisions according to: i) Choose an appropriate frame size based on constraints. ii) Partition jobs into slices.

  The impact of a catastrophic failure can be the difference

the impact of a catastrophic failure can be the difference between making and breaking an organization. many government

  Which of the given is a critical component of the

which of the following is a critical component of the self-defending network framework that relies on 802.1x and

  Designing new datacenter for existing complement of servers

You have been hired as independent contractor to support company in designing a new datacenter for its existing complement of 16 Unix servers, 32 Windows servers, and 10 racks of network

  Purpose of key tag in rrsig resource record

Determine the purpose of the key tag in the RRSIG resource record.

  Design lan with operation over a distance

You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd